• 3D-Fingerprint Augment based on Super-Resolution for Indoor 3D WiFi Localization 

      Liu, Zhaoni; Wang, Xianmin; Chen, Zhikun; Zhao, Ming; Zhang, Sihai; Li, Jingyue (Chapter, 2021)
      Recently, 3D indoor positioning technology has attracted wide attention in smart medical treatment, intelligent robot and other application fields. Traditional 3D positioning technology requires to utilize the special-dedicated ...
    • A conceptual framework for smart city international standards 

      Guo, Hong; Gao, Shang; Li, Jingyue; Xue, Haona (Journal article; Peer reviewed, 2018)
      Smart Cities have been a global focus during the past ten years. They contribute to the achievement of the sustainability development goals (for economy, society, and environment) by leveraging information and communication ...
    • A Data-Driven Security Game to Facilitate Information Security Education 

      Løvgren, Dag Erik Homdrum; Li, Jingyue; Oyetoyan, Tosin Daniel (Chapter, 2019)
      Many universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and ...
    • A Decision Support Tool for Planning Lamp Post Charging Stations 

      Jørgensrud, Stian; Puvitharan, Ragulan (Master thesis, 2019)
      Det finnes mange artikler som har hatt et teoretisk fokus på optimal plassering av ladestasjoner. I Norge, hvor utbredelsen av elektriske kjøretøy er blant den høyeste i verden og det er flere ladestasjoner enn bensinstasjoner, ...
    • A Decision Support Tool for Planning Lamp Post Charging Stations 

      Jørgensrud, Stian; Puvitharan, Ragulan (Master thesis, 2019)
      Det finnes mange artikler som har hatt et teoretisk fokus på optimal plassering av ladestasjoner. I Norge, hvor utbredelsen av elektriske kjøretøy er blant den høyeste i verden og det er flere ladestasjoner enn bensinstasjoner, ...
    • A deep learning approach for anomaly detection based on SAE and LSTM in mechanical equipment 

      Li, Zhe; Li, Jingyue; Wang, Yi; Wang, Kesheng (Journal article; Peer reviewed, 2019)
      Anomaly in mechanical systems may cause equipment to break down with serious safety, environment, and economic impact. Since many mechanical equipment usually operates under tough working environments, which makes them ...
    • A Framework for Ontology Based Semantic Search 

      Hagelien, Thomas Fjæstad (Master thesis, 2018)
      Publicly-accessible open transport data is provided by the public sector in an effort to create new opportunities, stimulate innovation and enable new solutions that benefits the society. The number of datasets available ...
    • A multivocal literature review of blockchain security vulnerabilities and research practices 

      Medakovic, Damir (Master thesis, 2021)
      Kontekst: Ettersom blokkjedeteknologi raskt har økt i popularitet de siste årene så har sikkerheten av slike systemer fått økt fokus. For å holde takt med utviklingene vil fremtidige forskere trenge ressurser som syntetiserer ...
    • A novel approach to GUI layout testing 

      Hasselknippe, Kristian Fjeld (Master thesis, 2017)
      In this thesis we design and develop a novel approach to GUI testing, which focuses on validating GUI layouts. This is achieved by establishing a categorization of common layout errors found in modern apps, and encoding ...
    • A Novel Tool for Automatic GUI Layout Testing 

      Hasselknippe, Kristian Fjeld; Li, Jingyue (Journal article; Peer reviewed, 2017)
      As mobile apps are expected to run in many different screen sizes, the need to validate the correct positioning and rendering of graphical user interface (GUI) elements in such screens is increasing. In this paper, we first ...
    • A Survey on Attacks and Defenses Targeting Region Proposals in Object Detectors 

      Larsen, Marius Bæver (Master thesis, 2022)
      Objekt detektorer har etablert sin dominans i flere sikkerhetskritiske systemer, samtidig er det et økende antall studier som beviser at de er sårbare mot nøye beregnede forstyrrelser. Disse forstyrrelsene kan føre til ...
    • A Tool to Support Blockchain Threat Modeling 

      Haugum, Terje; Hoff, Bjørnar (Master thesis, 2022)
      Kontekst: Bekymringen for sikkerhet i blokkjedeteknologi har økt naturlig på grunn av økt interesse de siste årene. Potensielle trusler avslørt av eksisterende trusselmodelleringsverktøy er relatert til generelle IT-systemer. ...
    • A Tool to Support Blockchain Threat Modeling 

      Haugum, Terje; Hoff, Bjørnar (Master thesis, 2022)
      Kontekst: Bekymringen for sikkerhet i blokkjedeteknologi har økt naturlig på grunn av økt interesse de siste årene. Potensielle trusler avslørt av eksisterende trusselmodelleringsverktøy er relatert til generelle IT-systemer. ...
    • Advantages and opportunities of the IOTA Tangle for Health Data Management: A Systematic Mapping Study 

      Rydningen, Eivind; Åsberg, Erika; Jaccheri, Maria Letizia; Li, Jingyue (Chapter, 2022)
      The merging of Distributed Ledger Technology (DLT) and the Internet of Things (IoT) has opened new opportunities for innovation in health data management. Issues such as security breaches, privacy violations and fragmented ...
    • Agile Enterprise Architecture by Leveraging Use Cases 

      Guo, Hong; Li, Jingyue; Gao, Shang; Smite, Darja (Chapter, 2021)
      Despite benefits Enterprise Architecture (EA) has brought, EA has also been challenged due to its complexity, heavy workload demands, and poor user acceptance. Researchers and practitioners proposed to use EA in an agile ...
    • An Evaluation of messages-based Systems Integration with respect to Performance: A case study 

      Smaavik, Trond Fallan; Øvstetun, Nils Torstein (Master thesis, 2007)
      This report describes a case-study evaluation of two integration strategies with particular focus on performance. The study is motivated by integration challengers within a company we have cooperated with, and our wish to ...
    • An experimental evaluation of bow-tie analysis for cybersecurity requirements 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of ...
    • An experimental evaluation of bow-tie analysis for security 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Purpose Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between ...
    • Application of BCT in the Norwegian secondhand market of high-end apparal 

      Sole, Olav Nuland (Master thesis, 2022)
      Blockchain teknologi (BCT) er kjent for kryptovaluta, men er det andre lovende bruksområder? Bruk i et bruktmarkdet kan gi videre grunnlag for bruknad av BCT som et verktøy for sirkulære markeder, da det can forbedre ...
    • AST-SafeSec: Adaptive Stress Testing for Safety and Security Co-Analysis of Cyber-Physical Systems 

      Kaloudi, Nektaria; Li, Jingyue (Journal article; Peer reviewed, 2023)
      Cyber-physical systems are becoming more intelligent with the adoption of heterogeneous sensor networks and machine learning capabilities that deal with an increasing amount of input data. While this complexity aims to ...